Archive for the ‘Ai’ Category

Staying ahead of threat actors in the age of AI – Microsoft

Over the last year, the speed, scale, and sophistication of attacks has increased alongside the rapid development and adoption of AI. Defenders are only beginning to recognize and apply the power of generative AI to shift the cybersecurity balance in their favor and keep ahead of adversaries. At the same time, it is also important for us to understand how AI can be potentially misused in the hands of threat actors. In collaboration with OpenAI, today we are publishing research on emerging threats in the age of AI, focusing on identified activity associated with known threat actors, including prompt-injections, attempted misuse of large language models (LLM), and fraud. Our analysis of the current use of LLM technology by threat actors revealed behaviors consistent with attackers using AI as another productivity tool on the offensive landscape. You can read OpenAIs blog on the research here. Microsoft and OpenAI have not yet observed particularly novel or unique AI-enabled attack or abuse techniques resulting from threat actors usage of AI. However, Microsoft and our partners continue to study this landscape closely.

The objective of Microsofts partnership with OpenAI, including the release of this research, is to ensure the safe and responsible use of AI technologies like ChatGPT, upholding the highest standards of ethical application to protect the community from potential misuse. As part of this commitment, we have taken measures to disrupt assets and accounts associated with threat actors, improve the protection of OpenAI LLM technology and users from attack or abuse, and shape the guardrails and safety mechanisms around our models. In addition, we are also deeply committed to using generative AI to disrupt threat actors and leverage the power of new tools, including Microsoft Copilot for Security, to elevate defenders everywhere.

The progress of technology creates a demand for strong cybersecurity and safety measures. For example, the White Houses Executive Order on AI requires rigorous safety testing and government supervision for AI systems that have major impacts on national and economic security or public health and safety. Our actions enhancing the safeguards of our AI models and partnering with our ecosystem on the safe creation, implementation, and use of these models align with the Executive Orders request for comprehensive AI safety and security standards.

In line with Microsofts leadership across AI and cybersecurity, today we are announcing principles shaping Microsofts policy and actions mitigating the risks associated with the use of our AI tools and APIs by nation-state advanced persistent threats (APTs), advanced persistent manipulators (APMs), and cybercriminal syndicates we track.

These principles include:

Microsoft remains committed to responsible AI innovation, prioritizing the safety and integrity of our technologies with respect for human rights and ethical standards. These principles announced today build on Microsofts Responsible AI practices, our voluntary commitments to advance responsible AI innovation and the Azure OpenAI Code of Conduct. We are following these principles as part of our broader commitments to strengthening international law and norms and to advance the goals of the Bletchley Declaration endorsed by 29 countries.

Because Microsoft and OpenAIs partnership extends to security, the companies can take action when known and emerging threat actors surface. Microsoft Threat Intelligence tracks more than 300 unique threat actors, including 160 nation-state actors, 50 ransomware groups, and many others. These adversaries employ various digital identities and attack infrastructures. Microsofts experts and automated systems continually analyze and correlate these attributes, uncovering attackers efforts to evade detection or expand their capabilities by leveraging new technologies. Consistent with preventing threat actors actions across our technologies and working closely with partners, Microsoft continues to study threat actors use of AI and LLMs, partner with OpenAI to monitor attack activity, and apply what we learn to continually improve defenses. This blog provides an overview of observed activities collected from known threat actor infrastructure as identified by Microsoft Threat Intelligence, then shared with OpenAI to identify potential malicious use or abuse of their platform and protect our mutual customers from future threats or harm.

Recognizing the rapid growth of AI and emergent use of LLMs in cyber operations, we continue to work with MITRE to integrate these LLM-themed tactics, techniques, and procedures (TTPs) into the MITRE ATT&CK framework or MITRE ATLAS (Adversarial Threat Landscape for Artificial-Intelligence Systems) knowledgebase. This strategic expansion reflects a commitment to not only track and neutralize threats, but also to pioneer the development of countermeasures in the evolving landscape of AI-powered cyber operations. A full list of the LLM-themed TTPs, which include those we identified during our investigations, is summarized in the appendix.

The threat ecosystem over the last several years has revealed a consistent theme of threat actors following trends in technology in parallel with their defender counterparts. Threat actors, like defenders, are looking at AI, including LLMs, to enhance their productivity and take advantage of accessible platforms that could advance their objectives and attack techniques. Cybercrime groups, nation-state threat actors, and other adversaries are exploring and testing different AI technologies as they emerge, in an attempt to understand potential value to their operations and the security controls they may need to circumvent. On the defender side, hardening these same security controls from attacks and implementing equally sophisticated monitoring that anticipates and blocks malicious activity is vital.

While different threat actors motives and complexity vary, they have common tasks to perform in the course of targeting and attacks. These include reconnaissance, such as learning about potential victims industries, locations, and relationships; help with coding, including improving things like software scripts and malware development; and assistance with learning and using native languages. Language support is a natural feature of LLMs and is attractive for threat actors with continuous focus on social engineering and other techniques relying on false, deceptive communications tailored to their targets jobs, professional networks, and other relationships.

Importantly, our research with OpenAI has not identified significant attacks employing the LLMs we monitor closely. At the same time, we feel this is important research to publish to expose early-stage, incremental moves that we observe well-known threat actors attempting, and share information on how we are blocking and countering them with the defender community.

While attackers will remain interested in AI and probe technologies current capabilities and security controls, its important to keep these risks in context. As always, hygiene practices such as multifactor authentication (MFA) and Zero Trust defenses are essential because attackers may use AI-based tools to improve their existing cyberattacks that rely on social engineering and finding unsecured devices and accounts.

The threat actors profiled below are a sample of observed activity we believe best represents the TTPs the industry will need to better track using MITRE ATT&CK framework or MITRE ATLAS knowledgebase updates.

Forest Blizzard (STRONTIUM) is a Russian military intelligence actor linked to GRU Unit 26165, who has targeted victims of both tactical and strategic interest to the Russian government. Their activities span across a variety of sectors including defense, transportation/logistics, government, energy, non-governmental organizations (NGO), and information technology. Forest Blizzard has been extremely active in targeting organizations in and related to Russias war in Ukraine throughout the duration of the conflict, and Microsoft assesses that Forest Blizzard operations play a significant supporting role to Russias foreign policy and military objectives both in Ukraine and in the broader international community. Forest Blizzard overlaps with the threat actor tracked by other researchers as APT28 and Fancy Bear.

Forest Blizzards use of LLMs has involved research into various satellite and radar technologies that may pertain to conventional military operations in Ukraine, as well as generic research aimed at supporting their cyber operations. Based on these observations, we map and classify these TTPs using the following descriptions:

Similar to Salmon Typhoons LLM interactions, Microsoft observed engagement from Forest Blizzard that were representative of an adversary exploring the use cases of a new technology. As with other adversaries, all accounts and assets associated with Forest Blizzard have been disabled.

Emerald Sleet (THALLIUM) is a North Korean threat actor that has remained highly active throughout 2023. Their recent operations relied on spear-phishing emails to compromise and gather intelligence from prominent individuals with expertise on North Korea. Microsoft observed Emerald Sleet impersonating reputable academic institutions and NGOs to lure victims into replying with expert insights and commentary about foreign policies related to North Korea. Emerald Sleet overlaps with threat actors tracked by other researchers as Kimsuky and Velvet Chollima.

Emerald Sleets use of LLMs has been in support of this activity and involved research into think tanks and experts on North Korea, as well as the generation of content likely to be used in spear-phishing campaigns. Emerald Sleet also interacted with LLMs to understand publicly known vulnerabilities, to troubleshoot technical issues, and for assistance with using various web technologies. Based on these observations, we map and classify these TTPs using the following descriptions:

All accounts and assets associated with Emerald Sleet have been disabled.

Crimson Sandstorm (CURIUM) is an Iranian threat actor assessed to be connected to the Islamic Revolutionary Guard Corps (IRGC). Active since at least 2017, Crimson Sandstorm has targeted multiple sectors, including defense, maritime shipping, transportation, healthcare, and technology. These operations have frequently relied on watering hole attacks and social engineering to deliver custom .NET malware. Prior research also identified custom Crimson Sandstorm malware using email-based command-and-control (C2) channels. Crimson Sandstorm overlaps with the threat actor tracked by other researchers as Tortoiseshell, Imperial Kitten, and Yellow Liderc.

The use of LLMs by Crimson Sandstorm has reflected the broader behaviors that the security community has observed from this threat actor. Interactions have involved requests for support around social engineering, assistance in troubleshooting errors, .NET development, and ways in which an attacker might evade detection when on a compromised machine. Based on these observations, we map and classify these TTPs using the following descriptions:

All accounts and assets associated with Crimson Sandstorm have been disabled.

Charcoal Typhoon (CHROMIUM) is a Chinese state-affiliated threat actor with a broad operational scope. They are known for targeting sectors that include government, higher education, communications infrastructure, oil & gas, and information technology. Their activities have predominantly focused on entities within Taiwan, Thailand, Mongolia, Malaysia, France, and Nepal, with observed interests extending to institutions and individuals globally who oppose Chinas policies. Charcoal Typhoon overlaps with the threat actor tracked by other researchers as Aquatic Panda, ControlX, RedHotel, and BRONZE UNIVERSITY.

In recent operations, Charcoal Typhoon has been observed interacting with LLMs in ways that suggest a limited exploration of how LLMs can augment their technical operations. This has consisted of using LLMs to support tooling development, scripting, understanding various commodity cybersecurity tools, and for generating content that could be used to social engineer targets. Based on these observations, we map and classify these TTPs using the following descriptions:

All associated accounts and assets of Charcoal Typhoon have been disabled, reaffirming our commitment to safeguarding against the misuse of AI technologies.

Salmon Typhoon (SODIUM) is a sophisticated Chinese state-affiliated threat actor with a history of targeting US defense contractors, government agencies, and entities within the cryptographic technology sector. This threat actor has demonstrated its capabilities through the deployment of malware, such as Win32/Wkysol, to maintain remote access to compromised systems. With over a decade of operations marked by intermittent periods of dormancy and resurgence, Salmon Typhoon has recently shown renewed activity. Salmon Typhoon overlaps with the threat actor tracked by other researchers as APT4 and Maverick Panda.

Notably, Salmon Typhoons interactions with LLMs throughout 2023 appear exploratory and suggest that this threat actor is evaluating the effectiveness of LLMs in sourcing information on potentially sensitive topics, high profile individuals, regional geopolitics, US influence, and internal affairs. This tentative engagement with LLMs could reflect both a broadening of their intelligence-gathering toolkit and an experimental phase in assessing the capabilities of emerging technologies.

Based on these observations, we map and classify these TTPs using the following descriptions:

Salmon Typhoons engagement with LLMs aligns with patterns observed by Microsoft, reflecting traditional behaviors in a new technological arena. In response, all accounts and assets associated with Salmon Typhoon have been disabled.

In closing, AI technologies will continue to evolve and be studied by various threat actors. Microsoft will continue to track threat actors and malicious activity misusing LLMs, and work with OpenAI and other partners to share intelligence, improve protections for customers and aid the broader security community.

Using insights from our analysis above, as well as other potential misuse of AI, were sharing the below list of LLM-themed TTPs that we map and classify to the MITRE ATT&CK framework or MITRE ATLAS knowledgebase to equip the community with a common taxonomy to collectively track malicious use of LLMs and create countermeasures against:

See the original post:

Staying ahead of threat actors in the age of AI - Microsoft

Apple is reportedly working on AI updates to Spotlight and Xcode – The Verge

A report from Bloomberg says Apple has expanded internal testing of new generative AI features for its Xcode programming software and plans to release them to third-party developers this year. Apple also reportedly looked at potential uses for generative AI in consumer-facing products, like automatic playlist creation in Apple Music, slideshows in Keynote, or AI chatbot-like search features for Spotlight search.

The search upgrade could let iOS and macOS users make natural language requests, like with ChatGPT, to get weather reports or operate features deep within apps.

Similar to Microsofts GitHub Copilot and Amazons CodeWhisperer, the programming tool Apple is working on applies a large language model to predict and complete strings of code and potentially write code to test apps.

Microsoft CEO Satya Nadella told analysts that GitHub Copilot had 1 million paying users as of November 2023. Since its launch, GitHub has added more capabilities to Copilot, including a chat feature that guides coders in real time and points out potential code breaks.Microsoft said it will have more news about Copilots and AI for developers at its Build 2024 event in May, and Apple may announce more about its AI plans during the annual WWDC event for developers later this year.

Apple CEO Tim Cooks statements about generative AI have been conservative compared to his counterparts at Google and Microsoft, but he confirmed in an investor call this month that more generative AI features will be coming this year.Sources told Bloomberg that executives demonstrated many of the AI features for Xcode to Apples board late last year.

Here is the original post:

Apple is reportedly working on AI updates to Spotlight and Xcode - The Verge

U.S. Patent and Trademark Office announces $70 million contract for AI patent search tool – FedScoop

The U.S. Patent and Trademark Office said this week that it intends to award an estimated $70 million contract to Accenture Federal Services for its Patent Search Artificial Intelligence capabilities.

The notice of intent described the need for a contractor to provide a full system development effort to continue maintenance for PSAI capabilities, and provide new enhancements for the component. USPTO anticipates negotiating and awarding this responsibility to AFS by April 1.

The office currently has an AI-based search tool for its Patents End-to-End (PE2E) suite to leverage AI for prior art searches, a tool that examiners use to assess the novelty of an invention, of which PSAI is a component.

In an effort to modernize the Patents Automated Information Systems, the USPTO launched PE2E, a single web-based system that provides examiners with a unified and robust set of tools to use in the examination process, the USPTO statement about PE2E states. PE2E Search is a system within PE2E that presents a modern interface design and introduces new tools and features, such as AI search capabilities.

USPTO in August announced that it was seeking information concerning AI deployment capabilities to improve searches for prior art during the patent process, FedScoop previously reported.

USPTO did not respond to a request for comment. AFS declined to comment.

Read the rest here:

U.S. Patent and Trademark Office announces $70 million contract for AI patent search tool - FedScoop

AI May Destroy Humankind in Just Two Years, Expert Says – Futurism

"We have a shred of a chance that humanity survives." Terminator Vision

The notoriously pessimistic AI researcher Eliezer Yudkowsky is back with a new prediction about the future of humankind.

"If you put me to a wall," he told The Guardian in a fascinating new interview, "and forced me to put probabilities on things, I have a sense that our current remaining timeline looks more like five years than 50 years. Could be two years, could be 10."

If you're wondering what "remaining timeline" means in this context,The Guardian's Tom Lamont interpreted it as the "machine-wrought end of all things," a "Terminator-like apocalypse," or a "Matrix hellscape."

"The difficulty is, people do not realise," Yudkowsky, the founder of theMachine Intelligence Research Institute in California, told the newspaper. "We have a shred of a chance that humanity survives."

The entireGuardianpiece is worth a read. Lamont spoke to many prominent figures in the space, ranging from Brian Merchant to Molly Crabapple, with the throughline being skepticism about the idea that just because a new tech comes along, we need to adopt it even if it's not good for people.

These days, the focus of much of that critique is AI. Why, critics contend, should we treat the tech as inevitable even if it seems poised to eliminate and destabilize large numbers of jobs?

Or, in Yudkowsky's case, if the tech likely presents an existential threat. His remarks were the most provocative in the piece, which probably isn't surprising given his history. AI watchers may remember last year, for instance, when he called for bombing data centers to halt the rise of AI.

He's rethought that particular claim, he toldThe Guardian but only slightly: he stands behind the idea of bombing data centers, he said, but no longer thinks that nuclear weapons should be used to target them.

"I would pick more careful phrasing now," he told the newspaper.

More on AI: Oppenheimer's Grandson Signs Letter Saying AI Threatens "Life on Earth"

Read the rest here:

AI May Destroy Humankind in Just Two Years, Expert Says - Futurism

SAP names Philipp Herzig as chief artificial intelligence officer – CIO

SAP is reorganizing its AI activities. Philipp Herzig, formerly head of cross-product engineering and experience, now leads a new end-to-end growth area focused on AI as the companys chief artificial intelligence officer (CAIO).

Herzig now reports directly to CEO Christian Klein, and will oversee the entire value chain for SAP business AI from research and product development through to implementation at the customer.

With this new structure, SAP aims to accelerate the pace of its AI development, according to a statement from the software manufacturer. The newly established organization also underlines the central importance of business AI as a strategic driver for SAPs further growth. Herzigs team will work closely with other innovators within SAP. The aim is to integrate artificial intelligence into every part of the portfolio. Based on this, customers should be able to use SAP business AI consistently across the entire SAP portfolio.

SAPs increased focus on business AI marks the start of a completely new generation of enterprise innovation, and Im honored to have the chance to help customers make the most of this unprecedented opportunity, said Herzig, describing his role. I look forward to working with our team, as well as our ecosystem of customers and partners, to drive the development and delivery of relevant, reliable, responsible business AI that fundamentally changes the way business runs.

Walter Sun, who moved from Microsoft to SAP in September 2023, will coordinate the development of SAPs next generation of enterprise software worldwide as Global Head of AI and lead AI product developer in Herzigs team. Herzig was already Suns boss before his latest move.

This is not the only change in SAPs reporting structure. At the beginning of 2024, the company established a new Executive Board department, Customer Services & Delivery. Its head, Thomas Saueressig, is tasked with driving the still hesitant cloud transformation among customers. Product Development, which Saueressig had previously headed, has been taken over by Muhammad Alam, who has also been promoted to the SAP Executive Board. Like Sun, Alam had moved from Microsoft to SAP, albeit at the end of January 2022.

Read the original here:

SAP names Philipp Herzig as chief artificial intelligence officer - CIO